2008 |
25 | EE | Austen Rainer,
Peter C. R. Lane,
James A. Malcolm,
Sven-Bodo Scholz:
Using n-grams to rapidly characterise the evolution of software code.
ASE Workshops 2008: 43-52 |
24 | EE | Mohammed S. Zahrani,
Martin J. Loomes,
James A. Malcolm,
Abu Zafer M. Dayem Ullah,
Kathleen Steinhöfel,
Andreas Alexander Albrecht:
Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing.
Computers & OR 35(6): 2049-2070 (2008) |
2007 |
23 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Springer 2007 |
22 | EE | Su Mon Bo,
Hannan Xiao,
Aderemi Adereti,
James A. Malcolm,
Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
IAS 2007: 50-55 |
21 | EE | Hannan Xiao,
James A. Malcolm,
Bruce Christianson,
Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing.
MobiQuitous 2007: 1-3 |
2006 |
20 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Springer 2006 |
19 | EE | Mohammed S. Zahrani,
Martin J. Loomes,
James A. Malcolm,
Andreas Alexander Albrecht:
Genetic local search for multicast routing.
GECCO 2006: 615-616 |
18 | EE | Mohammed S. Zahrani,
Martin J. Loomes,
James A. Malcolm,
Andreas Alexander Albrecht:
Landscape analysis for multicast routing.
Computer Communications 30(1): 101-116 (2006) |
2005 |
17 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Springer 2005 |
16 | EE | Bruce Christianson,
Partha Das Chowdhury,
James A. Malcolm:
Auditable Anonymous Delegation.
ICISS 2005: 66-76 |
15 | EE | Partha Das Chowdhury,
Bruce Christianson,
James A. Malcolm:
Anonymous Context Based Role Activation Mechanism.
Security Protocols Workshop 2005: 315-321 |
2004 |
14 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Springer 2004 |
13 | EE | Partha Das Chowdhury,
Bruce Christianson,
James A. Malcolm:
Anonymous Authentication.
Security Protocols Workshop 2004: 299-305 |
2003 |
12 | EE | James A. Malcolm:
Blind Publication: A Copyright Library without Publication or Trust.
Security Protocols Workshop 2003: 336-340 |
11 | EE | James A. Malcolm:
Blind Publication: A Copyright Library Without Publication or Trust (Discussion).
Security Protocols Workshop 2003: 341-349 |
2002 |
10 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers
Springer 2002 |
9 | EE | Caroline Lyon,
Bob Dickerson,
James A. Malcolm:
Incremental Retrieval of Documents Relevant to a Topic.
TREC 2002 |
2001 |
8 | | Jill Hewitt,
Sarah A. Jones,
James A. Malcolm,
Robert J. Ollenbuttel:
Experiences With Web Content Creation From a Database.
Digital Content Creation 2001: 316-331 |
7 | EE | James A. Malcolm:
Lightweight Authentication in a Mobile Network (Transcript of Discussion).
Security Protocols Workshop 2001: 217-220 |
2000 |
6 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
Springer 2000 |
5 | EE | Bruce Christianson,
Bruno Crispo,
James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Security Protocols Workshop 2000: 182-183 |
1999 |
4 | | Bruce Christianson,
James A. Malcolm,
Brian L. Robinson:
Pictures Can't Lie under Oath.
Security Protocols Workshop 1999: 208-218 |
1998 |
3 | EE | Bruce Christianson,
James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper).
Security Protocols Workshop 1998: 154-157 |
1997 |
2 | | Bruce Christianson,
James A. Malcolm:
Binding Bit Patterns to Real World Entities.
Security Protocols Workshop 1997: 105-113 |
1 | | Marie Rose Low,
James A. Malcolm:
A Joint Authorisation Scheme.
Operating Systems Review 31(1): 88-96 (1997) |